Latest SolarWinds vulnerabilities: CVE-2025-40551, CVE-2025-40552, CVE-2025-40553, CVE-2025-40554, and CVE-2025-40536 #
SolarWinds has disclosed multiple vulnerabilities affecting certain versions of Web Help Desk (WHD).
- An untrusted data deserialization vulnerability that could lead to remote code execution (RCE) designated CVE-2025-40551 and has been rated critical with a CVSS score of 9.8. Successful exploitation allows a remote, unauthenticated adversary to execute arbitrary code on the host machine. There is evidence that this vulnerability is being actively exploited in the wild.
- An authentication bypass vulnerability designated CVE-2025-40552 and has been rated critical with a CVSS score of 9.8. A remote, unauthenticated adversary could exploit this to trigger actions and methods that should otherwise be restricted.
- An untrusted data deserialization vulnerability that could lead to RCE designated CVE-2025-40553 and has been rated critical with a CVSS score of 9.8. Successful exploitation allows a remote, unauthenticated adversary to execute arbitrary code on the host machine.
- An authentication bypass vulnerability designated CVE-2025-40554 and has been rated critical with a CVSS score of 9.8. A remote, unauthenticated adversary could exploit this to invoke specific actions within Web Help Desk.
- A security control bypass vulnerability designated CVE-2025-40536 and has been rated high with a CVSS score of 8.1. Successful exploitation allows a remote, unauthenticated adversary to gain access to certain restricted functionality. There is evidence that this vulnerability is being actively exploited in the wild.
The following versions are affected
- SolarWinds Web Help Desk versions prior to 12.8.8 Hotfix 1 (HF1)
What is SolarWinds Web Help Desk?
#
SolarWinds Web Help Desk is an on-premises IT service management (ITSM) software that automates help desk ticketing, asset tracking, and change management through a centralized, self-hosted platform.
What is the impact? #
Successful exploitation of the vulnerability would allow an adversary to execute arbitrary code on the vulnerable host, potentially leading to complete system compromise.
Are updates or workarounds available? #
Users are encouraged to update to the latest version as quickly as possible:
- SolarWinds Web Help Desk upgrade to version 12.8.8 Hotfix 1 (HF1) or later
How to find potentially vulnerable systems with runZero #
From the Software Inventory, use the following query to locate potentially impacted assets:
vendor:=SolarWinds AND product:="Web Help Desk"
September 2025: CVE-2025-26399 #
SolarWinds has disclosed a deserialization of untrusted data vulnerability in the AjaxProxy component of its Web Help Desk (WHD). Successful exploitation allows a remote, unauthenticated adversary to achieve remote code execution (RCE) on the host machine. This vulnerability has been designated CVE-2025-26399 and has been rated critical with a CVSS score of 9.8. This vulnerability bypasses the patch for CVE-2024-28988, which in turn was an incomplete fix for the original vulnerability, CVE-2024-28986.
The following versions are affected
- SolarWinds Web Help Desk versions prior to 12.8.7 Hotfix 1 (HF1)
What is the impact? #
Successful exploitation of the vulnerability would allow an adversary to execute arbitrary code on the vulnerable host, potentially leading to complete system compromise.
Are updates or workarounds available? #
Users are encouraged to update to the latest version as quickly as possible:
- SolarWinds Web Help Desk upgrade to version 12.8.7 Hotfix 1 (HF1) or later
How to find potentially vulnerable systems with runZero #
From the Software Inventory, use the following query to locate potentially impacted assets:
vendor:=SolarWinds AND (product:="Web Help Desk" OR product:="webhelpdesk") AND (version:>0 AND version:<12.8.7.2174)
October 2024: CVE-2024-28987 #
According to the US Cybersecurity and Infrastructure Security Agency (CISA), a critical hardcoded password vulnerability within SolarWinds' Web Help Desk software is actively being exploited and was added to their Known Exploited Vulnerability (KEV) catalog.
CVE-2024-28987 is rated critical with CVSS score of 9.1 allowing for unauthorized access by a remote attacker.
What is the impact? #
A remote attacker has the ability to log in to a vulnerable system using hardcoded credentials, providing access to internal information with the ability to modify the data.
Are updates or workarounds available? #
According to the security advisory issued by SolarWinds, systems running "WHD 12.8.3 HF1 and all previous versions" of the Web Help Desk software are affected. Organizations are recommended to manually apply the hot fix released by SolarWinds to remove the hardcoded credentials from the software.
How to find potentially vulnerable systems with runZero #
From the Service Inventory, use the following query to locate systems running potentially vulnerable software:
_service.product:="SolarWinds:Web Help Desk:"